#76
|
|||
|
|||
VMProtect is the best uncrackable protection without hardware.
|
#77
|
|||
|
|||
I think flexlm with ECC is the best.
|
#78
|
|||
|
|||
snpslmd.exe daemon
|
#79
|
||||
|
||||
My vote goes toward VMProtect.
|
#80
|
|||
|
|||
WmProtect can be unpacked with LCF-AT Vmprotect 1.xx - 2.xx Ultra Unpacker V1.0.... thanks to LCF-AT.
|
#81
|
|||
|
|||
mix your experience in RE with Coding then you will make an uncrackable soft :d
|
#82
|
|||
|
|||
starforce the best for me and too hard ! also i will keep it private
But One day a friend Told me this : What ever is executed IS CAN BE CRACKED (he have cracked ZENON 7 ! |
#83
|
|||
|
|||
Hi p4r4d0x
"What ever is executed IS CAN BE CRACKED"; not always. |
#84
|
|||
|
|||
For all practical concerns, the statement "Whatever is executed can be cracked" is correct. However, from a more theoretical perspective, a protection based on homomorphic encryption is in principle not crackable, only its input and output are observable. For specific cases this can yield an uncrackable (i.e. not understable) mechanism.
|
#85
|
|||
|
|||
Protection builded on WhiteBox technology
|
#86
|
|||
|
|||
where i can get software + medicine?
|
#87
|
||||
|
||||
For your concern ... what is made by man hands will be "broken" also by mans hand.
So i think is no "uncrackable" protection. Just hard to bypass or reverse. It just require lots of knowledge and hard work. All software protections are down at the moment. Most of the hardware protections can be emulated, bypassed. I think the private solutions for the protections exists in every passionate reverser. Most of the strong protections solutions are kept in private so from here the impresion that a protection is "uncrackable". I think the discusion is futile. The thread subject is, IMHO, what is the hardest software protection not "uncrackable". |
#88
|
|||
|
|||
Quote:
Also, take crypto systems such as RSA or AES, those were built "by man" as well. By your logic you should be able to break any instance of it. That's obviously not true. |
#89
|
|||
|
|||
Quote:
homomorphic encryption looks nice as theory, but there are no existing implementations. |
#90
|
|||
|
|||
Quote:
Quote:
|
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
When use "vendor defined encryption routines", how to set daemon related part? | bridgeic | General Discussion | 6 | 01-22-2015 11:35 |
Wlscgen: Are "Vendor Id" and "Developer Id" different ? | Numega Softice | General Discussion | 6 | 02-12-2007 18:12 |